The current implementation for the Linux kernel debugging lacks support for kernel 4.13+ because of the randomize_layout security feature which randomizes the location of struct members during the kernel compilation process, thus the offset of each element may vary resulting in inaccurate readings.
The current implementation for the Linux kernel debugging lacks support for kernel 4.13+ because of the randomize_layout security feature which randomizes the location of struct members during the kernel compilation process, thus the offset of each element may vary resulting in inaccurate readings.
More information here about the feature https://lwn.net/Articles/722293/
note the randomized_struct_fields_start used in
Kernel 4.13+
which was not yet implemented in previous kernel versions
Kernel 4.12-